Search

Categories

In this episode, we demonstrate three ways to Bypass Hotspot’s Access Controls. A large amount of public hotspots require a fee to access the internet, and in this video we explain how a person can use Session Stealing, DNS Tunneling, and Ping Tunneling to bypass that hotspot’s access controls.

In this episode of Full Disclosure, Nox and I describe four improved methods of cracking WEP encryption: the ARP Request Replay Attack, Fragmentation Attack, Caffe Latte Attack, and Hirte Attack. The ARP Request Replay Attack and the Fragmentation Attack are known as clientless attacks because they do not require a client to be connected to the wireless AP. To initiate the attack, these two attacks only require one data packet. The Caffe Latte Attack and the Hirte Attack are client-based attacks because they specifically target clients to increase the IVs. Also, we show an improved method of cracking the IVs called the PTW cracking method. With the PTW method, WEP encryption can be cracked 80% of the time with only 60,000 IVs. For more information on the insecurities of WEP encryption watch Episode 2.

In Episode 22, Nox and I show you how to softmod your old Playstation 2 to enable you to run third
party software. We demonstrate how to use CogSwapLoader and HDLoader to allow you to backup your
PS2 games and play them either from a burned DVD or off your hard drive. To play a burned PS2 game,
it is necessary to open your CD Tray manually; we explain how to unlock your PS2′s CD Tray without
using a “Card Slide”. Other software like emulators and media players are also available; however,
they do not work nearly as well as the Xbox versions.

XSS Shell is a cross-site scripting backdoor into the victim’s browser which enables an attacker to issue commands and receive responses. During a normal XSS attack an attacker only has one chance to control a victim’s browser; however, the XSS Shell keeps the connection between the attacker and the victim open to allow the attacker to continuously manipulate the victim’s browser. XSS Shell works by setting up an XSS Channel, an AJAX application embedded into the victim’s browser, that can obtain commands and send back responses. To enable the XSS Shell an attacker needs to inject the XSS Shell’s Javascript reference by utilizing a XSS flaw on a website. Once the victim’s browser is infected with the XSS Shell and the XSS Channel is created, the attacker can issue instructions to the infected browser. Also, the Attacker can use a XSS Tunnel to transfer HTTP traffic through the XSS Channel and the victim’s browser; in turn, exploiting the victim’s credentials to bypass authentications and IP Restrictions. The XSS Tunnel is a HTTP Proxy that sits on an attacker’s computer, and any tool that is configured to use it will tunnel its traffic through the XSS Channel.

For this episode of Full Disclosure, we illustrate the many features of Ettercap. Ettercap is a program designed to sniff passwords on a LAN. It can recognize several different packets that contain passwords including Http, Telnet, Ftp, Pop, Rlogin, SSH1, ICQ, SMB, MySql, NNTP, X11, IRC, IMAP, VNC, SNMP, MSN, YMSG, etc. Furthermore, Ettercap can utilize Man in the Middle Attacks to hijack packets and redirect them to the attacker computer allowing it to extract passwords. In this episode, we show you how to use Arp Poisoning, DHCP Spoofing, and Port Stealing MITM Attacks and explain how they work. Also, we explain how to configure Ettercap to sniff encrypted passwords over the Secure Sock Layer (SSL and HTTPS). Moreover, Ettercap can be easily programmed to modify network traffic with the use of Filters. We demonstrate how to make many different Ettercap Filters. Ettercap comes with numerous plugins to advance Ettercap’s abilities; we explain how to use the Check Poison, Re-Poison, DNS Spoofing, Isolate, DoS Attack, Find IP, Gateway Discover, Search Promisc, Arp Cop, and Scan Poisoners Plugins. Lastly, we demonstrate how to use Ettercap’s Passive OS Fingerprinting feature. Ettercap supports passive dissection of many protocols allowing it to identify a host’s Operating System and Services.

In this addition of Full Disclosure, Nox and I show you how to crack local Linux and Window’s passwords. Furthermore, we explain how to reset and restore Linux or Window’s password for temporary access to a computer. There are different trade-offs for each method of bypassing local passwords. Cracking a password can take a long time, but knowing the password may help you gain access to other computers and programs. Reseting and Restoring a password is quick because you don’t need to know the password, but you will have to repeat this method every time you want access to the computer.

For episode 17, we demonstrate how to triple boot a computer with Windows, Backtrack, and Ubuntu. Nox and I go through the process of setting up the various disk partitions, installing Backtrack and Ubuntu to different partitions, and how to configure your computer to boot between each of the Operating Systems. Hopefully, this episode will give you guys insight on how to go about multibooting your computer with several different OSs.

This episode of Full Disclosure illustrates the progress of Cracking weak WPA Preshared Keys. Before you can crack the Preshared Key you must capture the four way handshake between the Access Point and a client; to accomplish this you must force the client to reconnect to the AP with the DeAuthentication attack we showed in episode 3. If you are using the Linksys WUSB54GC you will have to update your drivers to RaLink RT73 USB Enhanced Driver. In this episode we show you how to do this, and I also made a Backtrack module to automate the process. The module works in the same way as the IPWRAW Module for the Intel Pro/Wireless 3945ABG card, so you can watch that Vblog if you are having troubles.

For Full Disclosures first Modding episode, we show you how to turn your old Xbox that’s collecting dust, into a ultimate gaming/media playing/linux machine without opening the case. We use a specially crafted save game that exploits a vulnerability in Mech Assault to install a new Dashboard on the Xbox. The Xbox Media Center dashboard allows you to manage your music and videos, play your old favorite games with emulators, and it allows you to play backed up Xbox games. Furthermore, you can install various versions of Linux.